̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT)

No-Excuse Defenses Against Supply Chain Attacks


Event Date: February 23, 2021
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
During this webinar, Votiro's Director of Engineering, Richard Hosgood, and Thales Trusted Cyber Technologies' CTO, Brent Hansen, taught attendees:
  • How file attestation can be used to verify file integrity before downloading files to the network
  • How web isolation prevents compromised browsers from downloading malicious code
  • How Positive Selection technology proactively removes malicious code—including zero-days—from any files without removing active content or compromising user experience

Fill out the form below to view this archived event.


Resources


AI Companion Security and Privacy
Whitepaper

AI Companion Security and Privacy

Zoom's innovative federated approach to generative AI leverages its proprietary AI models to elevate AI Companion's performance and quality. Download our Whitepaper to explore more about Zoom's Companion AI and its key features.


Fill out the form below to view this Resource.